Infosecurity Blogs

  1. GDPR and Google Analytics – Privacy Concerns and Compliance Steps

    Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  2. I'm @InfosecEditor...Get Me Out of Here!

    Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  3. New OWASP Top 10: Beware of Poor Security Practices

    The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  4. Why “Shields Up” Starts with Understanding and Protecting the Attack Surface

    With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  5. OWASP Risk Ranking Changes Reflect Transforming and Dynamic Nature of Security

    The changes in the relative ranking of each application security risk and what they mean to you

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  6. Has Your Code Leaked?

    How to find out if your company is a victim of a source code leak

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  7. The Most In-Demand Cyber Skill for 2022

    A new category was rated as the most in-demand cybersecurity skill during this year's annual ISACA report

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  8. The Power of Foresight

    Without a certified business continuity management system, businesses leave themselves open to risk

    1. Photo of Rob Acker

      Rob Acker

      ICT Technical Manager, LRQA

  9. What is Adaptive Security?

    We must embrace new methodologies built to specifically address today’s evolving threats

    1. Photo of Ashley Guerra

      Ashley Guerra

      Product Marketing Manager, SecureLink

  10. Capitalizing on a Crisis: What Global Events Mean for Cybersecurity

    Cyber threats emanating from the Russia Ukraine are widespread and indiscriminate, and organizations must be prepared

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  11. OWASP Shines Light on Three New Risk Categories

    Security teams must consider the new categories when looking to protect against today’s application security risks

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  12. Cloud Services Are Increasingly Exploited for Command and Control in Cyber Espionage Operations

    Threat actors are making the most of cloud services for malicious purposes, so organizations should do the same for their security

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  13. OWASP Gives App Security a Fresh Look

    Non-profit revamps methodology for top 10 list to reflect new risks and challenges posed by remote work

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  14. Credential Harvesting and Initial Access: What Are They and How Can I Hit Back?

    Credential theft is a key element of initial access, and security teams must spot and respond to such activity rapidly

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  15. Time to Gear Up Your Company's Cybersecurity

    It's becoming impossible to ignore the need for additional layers of security

    1. Photo of Zack  Fair

      Zack Fair

      Product Manager, SafeDNS

  16. Why We Expect More Multi-Level Extortion (And What to Do About It)

    Why it matters to small to mid-sized enterprises and what IT and Security stakeholders can do about it

    1. Photo of Will Ehgoetz

      Will Ehgoetz

      Manager, Threat Hunting Team, ActZero

  17. Ransomware Is On The Rise: Here’s How To Stay Protected

    Ransomware is a mounting threat, but that doesn’t have to mean your organization is the next to be breached

    1. Photo of Isa Jones

      Isa Jones

      Content Writer, Secure Link

  18. Understanding DDoS Protection Options

    It's vital to understand the topology, advantages and disadvantages of different DDoS protection options

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  19. Let’s Go Bold in Pursuit of Cyber Talent

    From both recruitment and retention standpoints, there is much companies can do to calibrate their approaches for current realities

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  20. How Threat Hunting Evolved In 2021

    Threat hunting has been pushing to new limits since 2021, but what are the major developments that have allowed it to thrive?

    1. Photo of Bernadine Racoma

      Bernadine Racoma

      Content Manager, WorkSmartr

What’s Hot on Infosecurity Magazine?